mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2023-07-25T14:00:29.564290+00:00
This commit is contained in:
parent
0fb10e4b07
commit
2c9537ece3
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39421",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T20:15:10.087",
|
||||
"lastModified": "2023-07-24T20:15:10.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-24439",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2022-12-06T05:15:11.420",
|
||||
"lastModified": "2023-02-06T22:17:56.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-25T12:15:10.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/",
|
||||
"source": "report@snyk.io",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T14:15:10.040",
|
||||
"lastModified": "2023-07-24T14:15:10.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28864",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T14:15:10.103",
|
||||
"lastModified": "2023-07-24T14:15:10.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28865",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T14:15:10.157",
|
||||
"lastModified": "2023-07-24T14:15:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28867",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T14:15:10.210",
|
||||
"lastModified": "2023-07-24T14:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30280",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T14:15:10.267",
|
||||
"lastModified": "2023-07-24T14:15:10.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1386",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.150",
|
||||
"lastModified": "2023-07-24T16:15:11.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20593",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-07-24T20:15:10.237",
|
||||
"lastModified": "2023-07-24T21:15:09.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,18 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/24/3",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/1",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/5",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/6",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
|
||||
"source": "psirt@amd.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21405",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2023-07-25T08:15:09.927",
|
||||
"lastModified": "2023-07-25T08:15:09.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21406",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2023-07-25T08:15:10.003",
|
||||
"lastModified": "2023-07-25T08:15:10.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22363",
|
||||
"sourceIdentifier": "disclosures@gallagher.com",
|
||||
"published": "2023-07-25T00:15:09.540",
|
||||
"lastModified": "2023-07-25T00:15:09.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22428",
|
||||
"sourceIdentifier": "disclosures@gallagher.com",
|
||||
"published": "2023-07-24T23:15:11.230",
|
||||
"lastModified": "2023-07-24T23:15:11.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23568",
|
||||
"sourceIdentifier": "disclosures@gallagher.com",
|
||||
"published": "2023-07-25T02:15:09.317",
|
||||
"lastModified": "2023-07-25T02:15:09.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-238xx/CVE-2023-23833.json
Normal file
55
CVE-2023/CVE-2023-238xx/CVE-2023-23833.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23833",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-07-25T13:15:10.037",
|
||||
"lastModified": "2023-07-25T13:15:10.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Steven Henty Drop Shadow Boxes plugin <=\u00a01.7.10 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/drop-shadow-boxes/wordpress-drop-shadow-boxes-plugin-1-7-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25074",
|
||||
"sourceIdentifier": "disclosures@gallagher.com",
|
||||
"published": "2023-07-25T00:15:09.637",
|
||||
"lastModified": "2023-07-25T00:15:09.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26045",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-07-24T22:15:10.033",
|
||||
"lastModified": "2023-07-24T22:15:10.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26077",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T18:15:23.377",
|
||||
"lastModified": "2023-07-24T18:15:23.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26078",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T16:15:11.230",
|
||||
"lastModified": "2023-07-24T16:15:11.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
63
CVE-2023/CVE-2023-28xx/CVE-2023-2850.json
Normal file
63
CVE-2023/CVE-2023-28xx/CVE-2023-2850.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-2850",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-07-25T12:15:10.837",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NodeBB/NodeBB/releases/tag/v3.1.3",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j",
|
||||
"source": "report@snyk.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2860",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.293",
|
||||
"lastModified": "2023-07-24T16:15:11.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3019",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.253",
|
||||
"lastModified": "2023-07-24T16:15:12.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3046",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-07-25T06:15:15.993",
|
||||
"lastModified": "2023-07-25T06:15:15.993",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32231",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-25T01:15:09.107",
|
||||
"lastModified": "2023-07-25T01:15:09.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32232",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-25T01:15:09.177",
|
||||
"lastModified": "2023-07-25T01:15:09.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32247",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.470",
|
||||
"lastModified": "2023-07-24T16:15:11.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32248",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.543",
|
||||
"lastModified": "2023-07-24T16:15:11.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32252",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.610",
|
||||
"lastModified": "2023-07-24T16:15:11.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32257",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.680",
|
||||
"lastModified": "2023-07-24T16:15:11.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32258",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.750",
|
||||
"lastModified": "2023-07-24T16:15:11.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32637",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-07-25T06:15:10.893",
|
||||
"lastModified": "2023-07-25T06:15:10.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32639",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-07-25T04:15:10.467",
|
||||
"lastModified": "2023-07-25T04:15:10.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-25T01:15:09.240",
|
||||
"lastModified": "2023-07-25T01:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-339xx/CVE-2023-33925.json
Normal file
55
CVE-2023/CVE-2023-339xx/CVE-2023-33925.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-33925",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-07-25T13:15:10.157",
|
||||
"lastModified": "2023-07-25T13:15:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in PluginForage WooCommerce Product Categories Selection Widget plugin <=\u00a02.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-category-selection-widget/wordpress-woocommerce-product-categories-selection-widget-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33951",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.820",
|
||||
"lastModified": "2023-07-24T16:15:11.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33952",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:11.893",
|
||||
"lastModified": "2023-07-24T16:15:11.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3321",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-07-24T18:15:23.453",
|
||||
"lastModified": "2023-07-24T18:15:23.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3322",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-07-24T18:15:23.543",
|
||||
"lastModified": "2023-07-24T18:15:23.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3323",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-07-24T18:15:23.627",
|
||||
"lastModified": "2023-07-24T18:15:23.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3324",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-07-24T18:15:23.717",
|
||||
"lastModified": "2023-07-24T18:15:23.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3384",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.523",
|
||||
"lastModified": "2023-07-24T16:15:12.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34189",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-07-25T08:15:10.077",
|
||||
"lastModified": "2023-07-25T08:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -24,6 +24,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/smxqyx43hxjvzv4w71n2n3rfho9p378s",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34434",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-07-25T08:15:10.147",
|
||||
"lastModified": "2023-07-25T08:15:10.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -24,6 +24,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/3",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/7f1o71w5r732cspltmtdydn01gllf4jo",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34478",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-07-24T19:15:10.630",
|
||||
"lastModified": "2023-07-24T21:15:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-34xx/CVE-2023-3486.json
Normal file
55
CVE-2023/CVE-2023-34xx/CVE-2023-3486.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-3486",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2023-07-25T13:15:10.330",
|
||||
"lastModified": "2023-07-25T13:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host\u2019s file storage. This could exhaust system resources and prevent the service from operating as expected.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.tenable.com/security/research/tra-2023-23",
|
||||
"source": "vulnreport@tenable.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-350xx/CVE-2023-35043.json
Normal file
55
CVE-2023/CVE-2023-350xx/CVE-2023-35043.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-35043",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-07-25T13:15:10.243",
|
||||
"lastModified": "2023-07-25T13:15:10.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin <=\u00a01.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/recent-posts-slider/wordpress-recent-posts-slider-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35066",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-07-25T07:15:10.627",
|
||||
"lastModified": "2023-07-25T07:15:10.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35067",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-07-25T07:15:10.770",
|
||||
"lastModified": "2023-07-25T07:15:10.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35078",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-07-25T07:15:10.897",
|
||||
"lastModified": "2023-07-25T07:15:10.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35088",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-07-25T08:15:10.213",
|
||||
"lastModified": "2023-07-25T08:15:10.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -24,6 +24,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/4",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/os7b66x4n8dbtrdpb7c6x37bb1vjb0tk",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3567",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.990",
|
||||
"lastModified": "2023-07-24T16:15:12.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
47
CVE-2023/CVE-2023-36xx/CVE-2023-3637.json
Normal file
47
CVE-2023/CVE-2023-36xx/CVE-2023-3637.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-3637",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-25T13:15:10.407",
|
||||
"lastModified": "2023-07-25T13:15:10.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3637",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222270",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3640",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.063",
|
||||
"lastModified": "2023-07-24T16:15:13.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3681",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-15T10:15:09.323",
|
||||
"lastModified": "2023-07-17T13:02:42.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-25T13:59:49.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:retro_cellphone_online_store_project:retro_cellphone_online_store:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A77A0EBC-52BE-4672-A49E-9C10696CD13D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Retro%20Cellphone%20Online%20Store%20-%20vlun%208.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.234226",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.234226",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37361",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-25T01:15:09.377",
|
||||
"lastModified": "2023-07-25T01:15:09.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37613",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-24T19:15:10.717",
|
||||
"lastModified": "2023-07-24T19:15:10.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3745",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.130",
|
||||
"lastModified": "2023-07-24T16:15:13.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3748",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.203",
|
||||
"lastModified": "2023-07-24T16:15:13.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3750",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.267",
|
||||
"lastModified": "2023-07-24T16:15:13.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38200",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.067",
|
||||
"lastModified": "2023-07-24T16:15:12.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38745",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-25T04:15:10.633",
|
||||
"lastModified": "2023-07-25T04:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3812",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.337",
|
||||
"lastModified": "2023-07-24T16:15:13.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3863",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T15:15:09.397",
|
||||
"lastModified": "2023-07-24T15:15:09.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:13.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3871",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-24T22:15:11.363",
|
||||
"lastModified": "2023-07-24T22:15:11.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:09.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3872",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-24T22:15:11.867",
|
||||
"lastModified": "2023-07-24T22:15:11.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3873",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T00:15:09.720",
|
||||
"lastModified": "2023-07-25T00:15:09.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3874",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T01:15:09.617",
|
||||
"lastModified": "2023-07-25T01:15:09.617",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3875",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T02:15:09.407",
|
||||
"lastModified": "2023-07-25T02:15:09.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3876",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T02:15:09.490",
|
||||
"lastModified": "2023-07-25T02:15:09.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3877",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T03:15:09.510",
|
||||
"lastModified": "2023-07-25T03:15:09.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3878",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T03:15:09.600",
|
||||
"lastModified": "2023-07-25T03:15:09.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3879",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T04:15:10.733",
|
||||
"lastModified": "2023-07-25T04:15:10.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3880",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T04:15:10.890",
|
||||
"lastModified": "2023-07-25T04:15:10.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3881",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T05:15:09.297",
|
||||
"lastModified": "2023-07-25T05:15:09.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:01:04.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3882",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T05:15:09.480",
|
||||
"lastModified": "2023-07-25T05:15:09.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3883",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T06:15:16.410",
|
||||
"lastModified": "2023-07-25T06:15:16.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3884",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T06:15:16.720",
|
||||
"lastModified": "2023-07-25T06:15:16.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3885",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T07:15:11.550",
|
||||
"lastModified": "2023-07-25T07:15:11.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3886",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T08:15:10.280",
|
||||
"lastModified": "2023-07-25T08:15:10.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3887",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T08:15:10.353",
|
||||
"lastModified": "2023-07-25T08:15:10.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3888",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T08:15:10.420",
|
||||
"lastModified": "2023-07-25T08:15:10.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3890",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-07-25T09:15:11.557",
|
||||
"lastModified": "2023-07-25T09:15:11.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-3897",
|
||||
"sourceIdentifier": "security@42gears.com",
|
||||
"published": "2023-07-25T09:15:11.687",
|
||||
"lastModified": "2023-07-25T10:15:10.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-25T13:00:59.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "User enumeration in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below versions\u00a0\n\n"
|
||||
"value": "\nUsername enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.\n\nThis issue affects SureMDM On-premise: 6.31 and below version\u00a0\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -17,7 +17,7 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -25,12 +25,12 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
|
42
README.md
42
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-25T12:00:25.606777+00:00
|
||||
2023-07-25T14:00:29.564290+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-25T10:15:10.093000+00:00
|
||||
2023-07-25T13:59:49.107000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
220972
|
||||
220978
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
* [CVE-2023-2850](CVE-2023/CVE-2023-28xx/CVE-2023-2850.json) (`2023-07-25T12:15:10.837`)
|
||||
* [CVE-2023-23833](CVE-2023/CVE-2023-238xx/CVE-2023-23833.json) (`2023-07-25T13:15:10.037`)
|
||||
* [CVE-2023-33925](CVE-2023/CVE-2023-339xx/CVE-2023-33925.json) (`2023-07-25T13:15:10.157`)
|
||||
* [CVE-2023-35043](CVE-2023/CVE-2023-350xx/CVE-2023-35043.json) (`2023-07-25T13:15:10.243`)
|
||||
* [CVE-2023-3486](CVE-2023/CVE-2023-34xx/CVE-2023-3486.json) (`2023-07-25T13:15:10.330`)
|
||||
* [CVE-2023-3637](CVE-2023/CVE-2023-36xx/CVE-2023-3637.json) (`2023-07-25T13:15:10.407`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `77`
|
||||
|
||||
* [CVE-2023-3897](CVE-2023/CVE-2023-38xx/CVE-2023-3897.json) (`2023-07-25T10:15:10.093`)
|
||||
* [CVE-2023-3748](CVE-2023/CVE-2023-37xx/CVE-2023-3748.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3750](CVE-2023/CVE-2023-37xx/CVE-2023-3750.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3812](CVE-2023/CVE-2023-38xx/CVE-2023-3812.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-26077](CVE-2023/CVE-2023-260xx/CVE-2023-26077.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3321](CVE-2023/CVE-2023-33xx/CVE-2023-3321.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3322](CVE-2023/CVE-2023-33xx/CVE-2023-3322.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3323](CVE-2023/CVE-2023-33xx/CVE-2023-3323.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3324](CVE-2023/CVE-2023-33xx/CVE-2023-3324.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-34478](CVE-2023/CVE-2023-344xx/CVE-2023-34478.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-37613](CVE-2023/CVE-2023-376xx/CVE-2023-37613.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-26045](CVE-2023/CVE-2023-260xx/CVE-2023-26045.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3871](CVE-2023/CVE-2023-38xx/CVE-2023-3871.json) (`2023-07-25T13:01:09.337`)
|
||||
* [CVE-2023-3863](CVE-2023/CVE-2023-38xx/CVE-2023-3863.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-1386](CVE-2023/CVE-2023-13xx/CVE-2023-1386.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-26078](CVE-2023/CVE-2023-260xx/CVE-2023-26078.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-2860](CVE-2023/CVE-2023-28xx/CVE-2023-2860.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-32247](CVE-2023/CVE-2023-322xx/CVE-2023-32247.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-32248](CVE-2023/CVE-2023-322xx/CVE-2023-32248.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-32252](CVE-2023/CVE-2023-322xx/CVE-2023-32252.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-32257](CVE-2023/CVE-2023-322xx/CVE-2023-32257.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-32258](CVE-2023/CVE-2023-322xx/CVE-2023-32258.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-33951](CVE-2023/CVE-2023-339xx/CVE-2023-33951.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-33952](CVE-2023/CVE-2023-339xx/CVE-2023-33952.json) (`2023-07-25T13:01:13.730`)
|
||||
* [CVE-2023-3681](CVE-2023/CVE-2023-36xx/CVE-2023-3681.json) (`2023-07-25T13:59:49.107`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user